Use the ____ command to create a list with more than one level, such as the following list:
1. Conduct needs assessment
1.1 Collect data1.2 Analyze data
2. Sequence events
A. bullets
B. indent
C. multilevel list
D. numbering
Answer: C
You might also like to view...
Many block ciphers have a __________ structure which consists of a number of identical rounds of processing and in each round a substitution is performed on one half of the data being processed, followed by a permutation that interchanges the two halves. ? ?
Fill in the blank(s) with the appropriate word(s).
Briefly define the term “menu.” Write your answer on a piece of paper and put it upside down on the table together with the definitions of four other students. Compare all five definitions and discuss any substantial difference.
What will be an ideal response?
Network firewall entry and exit points are called ____.
A. sockets B. ports C. gateways D. proxies
Because a(n) shape tween uses symbols, it is an efficient way to animate objects.
Answer the following statement true (T) or false (F)